Netlas.io
2.06K subscribers
348 photos
3 videos
478 links
Explore the latest in cybersecurity with Netlas.io. Stay ahead with updates on high-profile vulnerabilities, expert tutorials, essential safety tips, and the latest Netlas developments.
Download Telegram
Netlas vs Censys: A Comprehensive Analysis ๐Ÿงฎ

A new article in our series of comparisons with competitors.

This time we evaluated the pros and cons of Censys, which proved to be the strongest of our opponents. However, we tried to evaluate both search engines as honestly as possible, using 10+ key indicators.

๐Ÿ‘‰ Read now: https://netlas.io/blog/netlas_vs_censys/
๐Ÿ‘4๐Ÿ‘พ4โค3
CVE-2025-25064, -25065: Two vulnerabilities in Zimbra, 5.3 - 9.8 rating ๐Ÿ”ฅ

Vulnerabilities include SQL injection and SSRF, which could potentially lead to RCE. We recommend installing the latest patches as soon as possible.

Search at Netlas.io:
๐Ÿ‘‰ Link: https://nt.ls/nehV7
๐Ÿ‘‰ Dork: http.favicon.hash_sha256:1afd891aacc433e75265e3ddc9cb4fc63b88259977811384426c535037711637 OR \*.banner:"Zimbra"

Vendor's advisory: https://wiki.zimbra.com/wiki/Zimbra_Security_Advisories
๐Ÿ”ฅ3๐Ÿ‘พ2
CVE-2025-22467: RCE in Ivanti Connect Secure, 9.9 rating ๐Ÿ”ฅ๐Ÿ”ฅ๐Ÿ”ฅ

A stack-based buffer overflow in Ivanti Connect Secure allows a remote authenticated attacker to achieve remote code execution.

Search at Netlas.io:
๐Ÿ‘‰ Link: https://nt.ls/WojuE
๐Ÿ‘‰ Dork: http.body:"welcome.cgi?p=logo"

Vendor's advisory: https://forums.ivanti.com/s/article/February-Security-Advisory-Ivanti-Connect-Secure-ICS-Ivanti-Policy-Secure-IPS-and-Ivanti-Secure-Access-Client-ISAC-Multiple-CVEs?language=en_US
๐Ÿ”ฅ6๐Ÿ‘2๐Ÿ‘พ1
CVE-2025-0376 and other: Multiple vulnerabilitites in GitLab, 4.2 - 8.7 ratingโ—๏ธ

With the new release, GitLab has disclosed several vulnerabilities, including XSS injection, DoS and others.

Search at Netlas.io:
๐Ÿ‘‰ Link: https://nt.ls/50gFr
๐Ÿ‘‰ Dork: http.favicon.hash_sha256:72a2cad5025aa931d6ea56c3201d1f18e68a8cd39788c7c80d5b2b82aa5143ef OR http.headers.set_cookie:"gitlab" OR http.headers.location:"gitlab"

Vendor's advisory: https://about.gitlab.com/releases/2025/02/12/patch-release-gitlab-17-8-2-released/
๐Ÿ”ฅ3๐Ÿ‘พ3๐Ÿ‘1
CVE-2025-1094: Improper Neutralization of Quoting Syntax in PostgreSQL functions, 8.1 ratingโ—๏ธ

A vulnerability in some functions of the libpq library allows SQL injection.

Search at Netlas.io:
๐Ÿ‘‰ Link: https://nt.ls/EtVPc
๐Ÿ‘‰ Dork: postgres:*

Vendor's advisory: https://www.postgresql.org/support/security/CVE-2025-1094/
๐Ÿ”ฅ3โค2๐Ÿ‘พ2
CVE-2024-12562: Deserialization of Untrusted Data in s2member Pro WordPress Plugin, 9.8 rating ๐Ÿ”ฅ

The vulnerability allows attackers to inject PHP Object on all versions of the plugin, except the latest.

Search at Netlas.io:
๐Ÿ‘‰ Link: https://nt.ls/GqND6
๐Ÿ‘‰ Dork: http.body:"plugins/s2member"

Read more: https://www.wordfence.com/threat-intel/vulnerabilities/wordpress-plugins/s2member-pro/s2member-pro-241216-unauthenticated-php-object-injection
๐Ÿ‘2๐Ÿ”ฅ2๐Ÿ‘พ1
CVE-2025-26465, -26466: Two vulnerabilities in OpenSSH, 6.8 ratingโ—๏ธ

MitM and DoS in OpenSSH. The severity level is medium, but the vulnerabilities cover many versions: from 2013 for -26465 and from 2023 for -26466.

Search at Netlas.io:
๐Ÿ‘‰ Link: https://nt.ls/1TTrj
๐Ÿ‘‰ Dork: ssh.server_key_exchange.client_to_server_compression:"zlib@openssh.com"

Read more: https://blog.qualys.com/vulnerabilities-threat-research/2025/02/18/qualys-tru-discovers-two-vulnerabilities-in-openssh-cve-2025-26465-cve-2025-26466
๐Ÿ”ฅ3๐Ÿ‘2๐Ÿ‘พ1
๐Ÿ” Track Adversary Infrastructure Challenge
Join the challenge by Netlas and RST Cloud to improve your threat-hunting skills.

- Learn to detect C2 servers and investigate real threats.
- Compete for prizes: ๐Ÿ† $1000, ๐Ÿฅˆ $500, ๐Ÿฅ‰ $250.
- Top 10 winners receive Netlas Annual Business Subscription and RST IoC Lookup Subscription.
- All participants get a certificate of completion.
- Free 1-month access to Netlas for practice.

๐Ÿ’ก Whatโ€™s included:
- Webinar on threat intelligence and C2 tracking.
- Hands-on challenge with Netlas and RST Cloud tools.
- Discord community for support and collaboration.

๐Ÿ‘‰ Invite a friend to team up and participate: https://netlas.io/promo/ti-challenge/
๐Ÿ‘พ5โค4๐Ÿ”ฅ3
CVE-2025-23209: Code Injection in CraftCMS, 8.1 ratingโ—๏ธ

Craft CMS contains a code injection vulnerability that allows for remote code execution as vulnerable versions have compromised user security keys.

Search at Netlas.io:
๐Ÿ‘‰ Link: https://nt.ls/brxoj
๐Ÿ‘‰ Dork: http.headers.x_powered_by:"Craft CMS"

Vendor's advisory: https://github.com/craftcms/cms/security/advisories/GHSA-x684-96hh-833x
โค2๐Ÿ”ฅ2๐Ÿ‘พ2
Netlas.io pinned ยซ๐Ÿ” Track Adversary Infrastructure Challenge Join the challenge by Netlas and RST Cloud to improve your threat-hunting skills. - Learn to detect C2 servers and investigate real threats. - Compete for prizes: ๐Ÿ† $1000, ๐Ÿฅˆ $500, ๐Ÿฅ‰ $250. - Top 10 winners receiveโ€ฆยป
CVE-2025-26794: SQL Injection in Exim 4.98, 7.5 ratingโ—๏ธ

A vulnerability in the Exim mail transfer agent could allow a remote attacker to perform SQL injection.

Search at Netlas.io:
๐Ÿ‘‰ Link: https://nt.ls/ge4Iy
๐Ÿ‘‰ Dork: smtp.banner:"Exim 4.98"

Vendor's advisory: https://www.exim.org/static/doc/security/CVE-2025-26794.txt
๐Ÿ‘พ3๐Ÿ”ฅ2๐Ÿ‘1
CVE-2025-1128: RCE in Everest Forms WordPress Plugin, 9.8 rating ๐Ÿ”ฅ

The vulnerability allows an unauthenticated attacker to perform a wide range of actions with the site: upload arbitrary files, RCE, delete config files.

Search at Netlas.io:
๐Ÿ‘‰ Link: https://nt.ls/q6pgJ
๐Ÿ‘‰ Dork: http.body:"plugins/everest-forms"

Read more: https://www.wordfence.com/blog/2025/02/100000-wordpress-sites-affected-by-arbitrary-file-upload-read-and-deletion-vulnerability-in-everest-forms-wordpress-plugin/
๐Ÿ”ฅ3๐Ÿ‘พ2๐Ÿ‘1
CVE-2025-24752: XSS in Elementor Page Builder, 7.1 ratingโ—๏ธ

Reflected XSS in a large number of sites. Thanks to our friend Chirag Artani for suggesting the query!

Search at Netlas.io:
๐Ÿ‘‰ Link: https://nt.ls/8wpei
๐Ÿ‘‰ Dork: http.body:"plugins/elementor" AND host_type:domain

Read more: https://patchstack.com/articles/reflected-xss-patched-in-essential-addons-for-elementor-affecting-2-million-sites/
๐Ÿ‘พ4โค2
CVE-2025-20029: Command Injection in F5 BIG-IP, 8.8 ratingโ—๏ธ

The vulnerability allows an attacker to escalate privileges, execute arbitrary commands, and manipulate system files. Not the latest vulnerability, but the PoC was published just recently!

Search at Netlas.io:
๐Ÿ‘‰ Link: https://nt.ls/e17gN
๐Ÿ‘‰ Dork: http.headers.server:"BigIP"

Vendor's advisory: https://my.f5.com/manage/s/article/K000148587
โค3๐Ÿ”ฅ2๐Ÿ‘พ1
CVE-2024-47051: RCE in Mautic, 9.1 rating ๐Ÿ”ฅ

The vulnerability allows an attacker to conduct RCE through asset loading, as well as manipulate the file deletion process to delete arbitrary files.

Search at Netlas.io:
๐Ÿ‘‰ Link: https://nt.ls/odIOX
๐Ÿ‘‰ Dork: http.favicon.hash_sha256:67a5904d731636c114513a7df90d4d6bff7a3f690f305ef3487ac84844a5874e

Vendor's advisory: https://github.com/mautic/mautic/security/advisories/GHSA-73gx-x7r9-77x2
๐Ÿ‘พ3โค2๐Ÿ”ฅ2
CVE-2025-23388, -23389: DoS and Unauthorized Access in Rancher, 8.2 - 8.4 ratingโ—๏ธ

Two vulnerabilities, one of which allows an attacker to crash the Rancher server, and the second - to impersonate any other user by manipulating cookies.

Search at Netlas.io:
๐Ÿ‘‰ Link: https://nt.ls/fCvlC
๐Ÿ‘‰ Dork: http.favicon.hash_sha256:2d7adbc74e7c8941927d04e702acbff577d219fef8617c8c3014d34ae395525b

Vendor's advisory: https://github.com/rancher/rancher/security/advisories/GHSA-mq23-vvg7-xfm4
๐Ÿ‘พ3๐Ÿ”ฅ2
CVE-2025-22224, -22225, -22226: Multiple vulnerabilities in VMware ESXi, 7.1 - 9.3 rating ๐Ÿ”ฅ

Three vulnerabilities affecting several VMware products, including ESXi. Includes Code Exection, Sandbox Escape and Memory Leak.

Search at Netlas.io:
๐Ÿ‘‰ Link: https://nt.ls/9Iw92
๐Ÿ‘‰ Dork: http.title:"+ ID_EESX_Welcome +"

Vendor's advisory: https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/25390
๐Ÿ‘พ4๐Ÿ”ฅ3๐Ÿ‘1
CVE-2025-26776: Unrestricted Upload of File with Dangerous Type in Chaty Pro WordPress Plugin, 10.0 rating ๐Ÿ”ฅ๐Ÿ”ฅ๐Ÿ”ฅ

The vulnerability allows an attacker to upload malicious files that can be used to take control of a website.

Search at Netlas.io:
๐Ÿ‘‰ Link: https://nt.ls/DCwYC
๐Ÿ‘‰ Dork: http.body:"plugins/chaty-pro"

Read more: https://patchstack.com/database/wordpress/plugin/chaty-pro/vulnerability/wordpress-chaty-pro-plugin-3-3-3-arbitrary-file-upload-vulnerability?_s_id=cve
๐Ÿ”ฅ4๐Ÿ‘พ2
๐Ÿšง Planned Maintenance ๐Ÿšง
Short-term interruptions in service provision are possibleโ—๏ธ

On the weekend of March 8-9, 2025, we will carry out work aimed at improving server stability and quality of service. All this time, the replicas will be disabled, which is why interruptions are possible in case of problems with the main server. We will do our best to complete it as quickly as possible.

Please remember to save your work before this time.
๐Ÿ‘จโ€๐Ÿ’ป3
CVE-2025-27622, -27623, -27624, -27625: Multiple vulnerabilitites in Jenkins, medium ratingโ—๏ธ

The vulnerabilities allow attackers to view encrypted secret values โ€‹โ€‹and potentially store attacker-controlled content in other users' profiles.

Search at Netlas.io:
๐Ÿ‘‰ Link: https://nt.ls/SyXh2
๐Ÿ‘‰ Dork: http.headers.x_jenkins:*

Vendor's advisory: https://www.jenkins.io/security/advisory/2025-03-05/
๐Ÿ”ฅ3๐Ÿ‘พ3๐Ÿ‘1
โ—๏ธTemporary Issues with Private Scanner โ—๏ธ

While expanding disk space, we encountered unexpected issues that temporarily affected one of our servers. As a result, Private Scanner is currently unavailable. All other functions work properly.

Our team is actively working on a fix, and the service will be restored by the end of the week โ€” possibly sooner.

We appreciate your patience and apologize for the inconvenience!
๐Ÿ’Š4๐Ÿ•Š2